首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2654篇
  免费   159篇
  国内免费   12篇
电工技术   27篇
化学工业   765篇
金属工艺   56篇
机械仪表   81篇
建筑科学   96篇
矿业工程   21篇
能源动力   92篇
轻工业   203篇
水利工程   20篇
石油天然气   8篇
武器工业   1篇
无线电   220篇
一般工业技术   531篇
冶金工业   167篇
原子能技术   33篇
自动化技术   504篇
  2023年   27篇
  2022年   54篇
  2021年   116篇
  2020年   87篇
  2019年   65篇
  2018年   100篇
  2017年   101篇
  2016年   99篇
  2015年   97篇
  2014年   132篇
  2013年   212篇
  2012年   159篇
  2011年   183篇
  2010年   140篇
  2009年   125篇
  2008年   138篇
  2007年   106篇
  2006年   92篇
  2005年   82篇
  2004年   59篇
  2003年   56篇
  2002年   49篇
  2001年   31篇
  2000年   27篇
  1999年   28篇
  1998年   44篇
  1997年   28篇
  1996年   22篇
  1995年   28篇
  1994年   26篇
  1993年   25篇
  1992年   17篇
  1991年   18篇
  1990年   12篇
  1989年   15篇
  1988年   11篇
  1987年   25篇
  1986年   16篇
  1985年   15篇
  1984年   14篇
  1983年   9篇
  1982年   16篇
  1981年   9篇
  1980年   7篇
  1979年   11篇
  1978年   7篇
  1976年   9篇
  1975年   9篇
  1973年   13篇
  1972年   8篇
排序方式: 共有2825条查询结果,搜索用时 15 毫秒
71.
In wireless systems, the communication mechanism combines features of broadcast, synchrony, and asynchrony. We develop an operational semantics for a calculus of wireless systems. We present different Reduction Semantics and a Labelled Transition Semantics and prove correspondence results between them. Finally, we apply CWS to the modelling of the Alternating Bit Protocol, and prove a simple correctness result as an example of the kind of properties that can be formalized in this framework.A major goal of the semantics is to describe the forms of interference among the activities of processes that are peculiar of wireless systems. Such interference occurs when a location is simultaneously reached by two transmissions. The Reduction Semantics differ on how information about the active transmissions is managed.We use the calculus to describe and analyse a few properties of a version of the Alternating Bit Protocol.  相似文献   
72.
This paper examines different technologies that can be applied in the design and development of a ground control station for Unmanned Aerial Vehicles (UAVs) equipped with multimodal interfaces. Multimodal technologies employ multiple sensory channels/modalities for information transmission as well as for system control. Examples of these technologies could be haptic feedback, head tracking, auditory information (3D audio), voice control, tactile displays, etc. The applicability and benefits of those technologies is analyzed for a task consisting in the acknowledgement of alerts in an UAV ground control station composed by three screens and managed by a single operator. For this purpose, several experiments were conducted with a group of individuals using different combinations of modal conditions (visual, aural and tactile).  相似文献   
73.
In the literature, there are few studies of the human factors involved in the engagement of presence. The present study aims to investigate the influence of five user characteristics – test anxiety, spatial intelligence, verbal intelligence, personality and computer experience – on the sense of presence. This is the first study to investigate the influence of spatial intelligence on the sense of presence, and the first to use an immersive virtual reality system to investigate the relationship between users’ personality characteristics and presence. The results show a greater sense of presence in test anxiety environments than in a neutral environment. Moreover, high test anxiety students feel more presence than their non-test anxiety counterparts. Spatial intelligence and introversion also influence the sense of presence experienced by high test anxiety students exposed to anxiety triggering virtual environments. These results may help to identify new groups of patients likely to benefit from virtual reality exposure therapy.  相似文献   
74.
In this paper, we present an analytical model to evaluate the hidden station effect on the performance of the IEEE 802.11 Distributed Coordination Function (DCF) in both non-saturation and saturation condition. DCF is a random channel-access scheme based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) method and the exponential backoff procedure. DCF is widely used and can support both wireless network with an access point and ad hoc wireless network because of its random channel-access method. On the other hand, this method unavoidably suffers the hidden station effect that causes significant performance degradation. As shown in this paper, hidden stations occur frequently in real-world settings, and the performance impact on the 802.11 DCF is a significant concern, but it has not been adequately studied. We study this problem through a spatial–temporal analysis and a Markov chain model. Our model generalizes the existing work on the performance modeling of 802.11 DCF for both non-saturation and saturation conditions. The scenario of no hidden station can be considered as a special case in our model. The performance of our model is evaluated by comparison with ns-2 simulations.  相似文献   
75.
We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L.  相似文献   
76.
A novel step sequence planning (SSP) method for biped-walking robots is presented. The method adopts a free space representation custom-designed for efficient biped robot motion planning. The method rests upon the approximation of the robot shape by a set of 3D cylindrical solids. This feature allows efficient determination of feasible paths in a 2.5D map, comprising stepping over obstacles and stair climbing. A SSP algorithm based on A-search is proposed which uses the advantages of the aforementioned environment representation. The efficiency of the proposed approach is evaluated by a series of simulations performed for eight walking scenarios.  相似文献   
77.
Inspired by the Witkowski’s algorithm, we introduce a novel path planning and replanning algorithm — the two-way D (TWD) algorithm — based on a two-dimensional occupancy grid map of the environment. Unlike the Witkowski’s algorithm, which finds optimal paths only in binary occupancy grid maps, the TWD algorithm can find optimal paths in weighted occupancy grid maps. The optimal path found by the TWD algorithm is the shortest possible path for a given occupancy grid map of the environment. This path is more natural than the path found by the standard D algorithm as it consists of straight line segments with continuous headings. The TWD algorithm is tested and compared to the D and Witkowski’s algorithms by extensive simulations and experimentally on a Pioneer 3DX mobile robot equipped with a laser range finder.  相似文献   
78.

Context

In software development, Testing is an important mechanism both to identify defects and assure that completed products work as specified. This is a common practice in single-system development, and continues to hold in Software Product Lines (SPL). Even though extensive research has been done in the SPL Testing field, it is necessary to assess the current state of research and practice, in order to provide practitioners with evidence that enable fostering its further development.

Objective

This paper focuses on Testing in SPL and has the following goals: investigate state-of-the-art testing practices, synthesize available evidence, and identify gaps between required techniques and existing approaches, available in the literature.

Method

A systematic mapping study was conducted with a set of nine research questions, in which 120 studies, dated from 1993 to 2009, were evaluated.

Results

Although several aspects regarding testing have been covered by single-system development approaches, many cannot be directly applied in the SPL context due to specific issues. In addition, particular aspects regarding SPL are not covered by the existing SPL approaches, and when the aspects are covered, the literature just gives brief overviews. This scenario indicates that additional investigation, empirical and practical, should be performed.

Conclusion

The results can help to understand the needs in SPL Testing, by identifying points that still require additional investigation, since important aspects regarding particular points of software product lines have not been addressed yet.  相似文献   
79.
Versioning is an important aspect of web service development, which has not been adequately addressed so far. In this article, we propose extensions to WSDL and UDDI to support versioning of web service interfaces at development-time and run-time. We address service-level and operation-level versioning, service endpoint mapping, and version sequencing. We also propose annotation extensions for developing versioned web services in Java. We have tested the proposed solution for versioning in two real-world environments and identified considerable improvements in service development and maintenance efficiency, improved service reuse, and simplified governance.  相似文献   
80.
In the present article, we continue the study of the propertiesof the spectra of structures as sets of degrees initiated in[11]. Here, we consider the relationships between the spectraand the jump spectra. Our first result is that every jump spectrumis also a spectrum. The main result sounds like a Jump inversiontheorem. Namely, we show that if a spectrum is contained inthe set of the jumps of the degrees in some spectrum then thereexists a spectrum such that and is equal to the set of thejumps of the degrees in .  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号